Standards  >   Network Protocols  >  

Xerox Networking Systems

RSS Feed    Add to Google    Add to My Yahoo!
Xerox Networking Systems Multimedia (View All Report Types)
Stay in Compliance: Clinical Standards Data Management
sponsored by Cambridge Semantics
VIDEO: In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010


IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

The Network Evolution University: Next Generation Networks
sponsored by
VIRTUAL SEMINAR: In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present.
Posted: 29 Sep 2011 | Premiered: 09 Nov 2011

HP Network Automation 9.00 Evaluation
sponsored by Hewlett Packard Enterprise
TRIAL SOFTWARE: HP Network Automation software tracks, regulates, and automates configuration and software changes across globally distributed, multi-vendor networks.
Posted: 16 Jul 2010 | Premiered: 16 Jul 2010

Hewlett Packard Enterprise

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010


Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Network Evolution University: Unified Wired and Wireless
sponsored by
VIRTUAL ENVIRONMENT: In this classroom, you'll learn how enterprise network managers can build a unified access layer for wired and wireless LANs, establish unified network infrastructure to meet the needs of both wired and wireless users, and deploy network discovery and troubleshooting capabilities that span both wired and wireless access networks.
Posted: 18 Jul 2013 | Premiered: 22 Jul 2013

Network Management
sponsored by
VIRTUAL ENVIRONMENT: Application performance is vital to todays distributed network, but determining the root cause of any performance issue requires immediate and pervasive visibility into all segments of the network. Learn how to use the new generation of tools and applications to help avoid performance and network problems.
Posted: 17 Apr 2014 | Premiered: 24 Aug 2016

Network Security Monitoring
sponsored by
VIRTUAL ENVIRONMENT: This classroom discusses how to meet the business-critical network security needs of the high-performance data center with a new generation of devices to prevent attacks and breaches via wired and wireless access networks.
Posted: 17 Jun 2013 | Premiered: 01 Apr 2016

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016


Network Considerations for Digital Building Infrastructure
sponsored by Panduit
WEBCAST: This webcast explores the concept of creating "Smart Space" workplaces by leveraging Power over Ethernet (PoE) technology to create digital building infrastructures. Discover how you can create smarter facility systems, like LED lighting that becomes part of an intelligent IP platform, allowing light fixtures to monitor CO2 levels and more.
Posted: 17 Oct 2016 | Premiered: Oct 17, 2016


Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Customer Story: Implementing Mobility in the Workplace
sponsored by Citrix
VIDEO: Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy and increased collaboration. Discover how you can provide your employees the flexibility of working outside of their offices and increase productivity.
Posted: 13 May 2016 | Premiered: 08 Oct 2013


Ransomware, Phishing and APTs: What Can be Done About These Growing Threats
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


What does mobility really mean?
sponsored by Citrix
VIDEO: In this video learn how one system can play a precise and integral role for enabling flexible workspaces and work styles without exposing your organization to risk. View now to learn more.
Posted: 13 May 2016 | Premiered: 06 Oct 2014


Case Study: Meet the Mobility, Collaboration and Security Needs of Your Users
sponsored by Citrix
VIDEO: When a massive amount of information is being shared on a daily basis, it is critical that your file sync and share system is up to par. Watch this video now to learn how one investment company enabled secure file sharing and mobility to meet the collaboration needs of users.
Posted: 13 May 2016 | Premiered: 23 Feb 2015


Increase productivity in a mobile world
sponsored by HPE and Intel®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel®

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Understanding Cloud-Specific Security Technologies
sponsored by
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

Targeted Attack Detection and Remediation Security School
sponsored by
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SD-WAN Dynamic Path Control Demo
sponsored by Silver Peak
WEBCAST: Access this short video to learn how you can manage different forms of traffic to balance your networking with an SD-WAN solution.
Posted: 08 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Mobile App that Lets You Control Your Network from Anywhere
sponsored by MASERGY
VIDEO: Have you ever wondered if there was an easier way to handle server issues—even when you're out of the office? Access this brief resource to see how you can simply administer and control cloud network infrastructure in real time, from anywhere using an intelligent service control mobile app.
Posted: 18 Mar 2016 | Premiered: 24 Apr 2015


All-Flash and Hybrid Flash Systems Simulator: An Overview
sponsored by Dell EMC
VIDEO: Looking to seamlessly extend data storage to the cloud, streamline management, and speed deployment? In this brief video, tune in to access an all-flash simulator that will accelerate your application infrastructure.
Posted: 13 Jun 2016 | Premiered: 13 Jun 2016

Dell EMC

Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013


SLA-Driven Data Protection Modernization: An ESG Video Interview
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 20 Sep 2016 | Premiered: 31 Mar 2016


Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

SD-WAN: Building a Virtual WAN
sponsored by Silver Peak
WEBCAST: Access this short video to learn how a software-defined WAN can improve your ability to connect users to applications in a business driven by cloud and mobile technologies.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Security University: New network security architecture
sponsored by
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

Evolve Your WAN to an SD-WAN
sponsored by Silver Peak
WEBCAST: This short video teaches you how a software-defined WAN based on broadband can give you the flexibility, control and performance necessary to connect users to cloud-based and mobile applications.
Posted: 07 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Transforming Enterprise Security with Advanced Analytics
sponsored by MASERGY
VIDEO: Watch this comprehensive webinar to uncover advanced techniques that help detect low and slow threats, such as the "grain of sand" style attack, that have come to keep the state of security in flux. Learn why a managed security service is important to have and what to look for in choosing one.
Posted: 31 May 2016 | Premiered: 18 Nov 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement